How hackers target customers through digital identities

How hackers target customers through digital identities

Scams aren't a result of an individual's naivety but because hackers use sophisticated tactics to deceive. They skilfully manipulate trust, turning seemingly genuine emails into potent tools for exploitation. Discover how even a harmless email can transform a customer into the weakest link in cyber security.

5 Mins

20th June 2024

Article

Cyber security, Mobile security

Manipulating someone to spill their passwords is often easier than breaking into a system directly. This tactic, social engineering, includes various malicious activities facilitated through psychological manipulation where perpetrators deceive users into committing security errors or revealing confidential data.

 

Fraudsters typically rely on two primary tactics: impersonating trusted entities and instilling a sense of urgency in their communications. For instance, they may send emails purportedly from a colleague requesting sensitive information or place urgent phone calls claiming a credit card transaction has failed. The urgency of these situations often prompts individuals to act impulsively, making it much easier to give away sensitive information.1

 

Fraudsters' toolbox

Phishing

Phishing
Fake emails requesting login details by posing as trusted entities like banks

Phishing

Baiting
Offering free movie downloads that require users to enter their email credentials

Spear phishing

Spear phishing
Targeted emails, often mimicking executives, directing specific actions like wire transfers

Scareware

Scareware
Fake virus alerts urging immediate purchase of antivirus software

Pretexting

Pretexting
Posing as delivery personnel to gain access to restricted areas

Vishing

Vishing
Deceiving individuals over the phone, often pretending to be tech support

The cost of deception

Protecting customers' digital identities is essential.

Protecting customers' digital identities is essential.

 

The financial consequences are evident, with government officials' impersonation scams leading the charts with average losses of $116,000, closely trailed by investment scams at $60,0002. Moreover, the emotional toll is substantial, as highlighted by a McKinsey survey revealing that 70% of banking customers felt anxiety, stress, or frustration upon being warned about potential fraud3. The figures from the Singapore Police Force further emphasise the severity, showing a consistent rise in losses, with victims losing S$651 million in 20234.

 

Safeguarding customers' digital identities goes beyond protecting finances. It is also about preserving trust, loyalty, and emotional well-being in an increasingly digital world.

 

How telcos data can aid in mitigating scams

Telco data is a shield for combating identity scams across the banking, finance, and retail sectors. With the help of telco data, businesses can swiftly detect suspicious activities, authenticate user identities, and prevent fraudulent transactions in real-time. Additionally, telco data helps identify anomalies in user behaviour, such as unusual login locations, unauthorised access attempts, or atypical transaction patterns, enabling immediate intervention to prevent fraudulent activities before they escalate.

 

Go beyond OTPs with SingVerify

When bad actors attempt login, they can deceive victims into approving authentication through social engineering tactics. This poses a significant risk to consumers as current Multifactor Authentication processes are susceptible to social engineering manipulation.

 

However, solutions like SingVerify offer a potent defence against such threats, empowering enterprises to effectively combat phishing and malware app scams. SingVerify's suite of solutions authenticates digital identities against telco data, a pioneering move in Singapore. Through various APIs, SingVerify grants on-demand and secure access to telco data, enabling telco networks to authenticate digital identities directly.

 

SingVerify sets itself apart from traditional methods by augmenting multifactor authentication using telco data. With SingVerify, service providers can validate customers' identities, matching their phone numbers against real-time telco data across various services like banking and social media. This silent authentication in the background significantly reduces opportunities for scammers to exploit two-factor or multifactor authentication processes, ensuring a safer digital environment for all users.

 

Security and improved user experience: have them both with SingVerify

SingVerify ensures seamless user authentication while safeguarding digital identities. Leveraging real-time telco data, it replaces vulnerable methods like OTPs with silent network authentication, which verifies users in the background without interrupting their experience.

Additionally, SingVerify is designed to align with the GSMA Open Gateway framework, a globally recognised initiative. This framework facilitates universal access, swift deployment, and seamless integration across diverse mobile networks. As a result, a broader spectrum of service providers and businesses can leverage SingVerify’s benefits.

 

Explore how the suite of SingVerify solutions can protect your business

 

Number Verify API: traditional MFA processes are vulnerable to social engineering attacks. Leveraging SIM cards and SIM-based data as secure authentication sources, Number Verify API conducts silent network authentication in real time, preventing scammers from hijacking 2FA or MFA processes.

 

Device Location API: when malicious actors attempt to access an employee's device, they often manipulate the user to approve authentication through social engineering tactics. SingVerify’s Device Location API verifies the device's location by triangulating real-time device location data with cell tower information, bolstering security measures.

 

Scam Sniffer API: utilising Scam Sniffer’s in-house analytical models, you can compile a blacklist of potential scammers. This list can be integrated with other databases. When a suspicious or high-value transaction occurs, the API can provide insights on whether the end-user has interacted with potential scammers, enabling proactive fraud prevention measures.

 

How SingVerify is transforming authentication for industry leaders

All-in-one trading platform, Tiger Brokers, and mobile authentication provider, IPification have integrated SingVerify into their security frameworks, enhancing authentication measures and streamlining verification processes.

Felix Huang, Head of Global Solutions at Tiger Brokers, emphasised the importance of such enhancements in ensuring robust client service experiences. Stefan Kostic, CEO of IPification, highlighted the global surge in digital fraud and the necessity for frictionless authentication solutions like SingVerify to safeguard users5.

This partnership signifies a commitment to bolstering security and user experiences for businesses and customers in Singapore.

 

Choose the right partner for cyber security

Combatting scams is a collective effort from governments, businesses, and citizens. Businesses must prioritise employee training, starting with selecting a reliable tech provider. Partnering with providers that offer ongoing support, seamless integration, and compliance with regulations can help strengthen defences against fraud.

 

Secure digital identities with Singtel.

 

References:

 

  1. What is social engineering, IBM
  2. Singapore Police Force News Release - MID-YEAR SCAMS AND CYBERCRIME STATISTICS 2023
  3. McKinsey, A new approach to fighting fraud while enhancing customer experience. 2022
  4. The Diplomat, Is Singapore Doing Enough to Safeguard Itself Against Cybersecurity Attacks and Scams?, 2024
  5. Singtel launches authentication solution, SingVerify, to curb rising scams, News Release, 2024

 

facebooktwitterlinkedin

Discover more insights

How 5G fuels a smarter and greener future
Video
How 5G fuels a smarter and greener future

5G, Sustainability, Connectivity

If you thought 5G was about speed, you only see half the picture. Beyond lightning-fast connectivity, 5G is quietly driving sustainability. With its energy-efficient design, 5G lowers power consumption even as data usage hits record highs.

Slow start, fast growth: The circular economy is taking off
Article
Slow start, fast growth: The circular economy is taking off

Sustainability, Manufacturing and logistics, Smart cities

For companies that embraced the circular economy early, the payoff is clear. They’ve proven more resilient to supply chain disruptions, are inherently more sustainable, and are less reliant on raw materials. Now, businesses just beginning their circular journey can accelerate progress by tapping into the technologies and insights already pioneered by these early movers.

How quantum computing is building sustainability
Article
How quantum computing is building sustainability

Sustainability

Quantum computing holds immense potential to reshape the way businesses operate. But it’s often the subtle, foundational shifts, like advancements in quantum sensing, that spark meaningful change. With clear sustainability benefits, quantum sensing should be harnessed for broader societal impact. However, without robust quantum-safe security in place, the momentum behind these innovations could slow before they truly take off.

What will happen in tech-driven sustainability in 2025?
Article
What will happen in tech-driven sustainability in 2025?

Sustainability, Transportation, Smart cities

2025 sits at a crossroads of tech and sustainability, and our next moves will influence the world for generations to come. Increased AI adoption, broader mandatory disclosure requirements and the increasing presence of EVs will be key moments in the coming year.

Greening the auto and manufacturing industries
Article
Greening the auto and manufacturing industries

Sustainability, 5G, Manufacturing and logistics

The automotive industry is pioneering both sustainable products and decarbonised manufacturing. Digital twins, autonomous robots and 5G are removing energy-hungry processes and enabling a more efficient, sustainable production line. What can other sectors learn from this revolution?

Human centred design and successful sustainability
Infographic
Human centred design and successful sustainability

Sustainability

Human-centred design is a practice that builds products and solutions with their end user in mind. Human-centred sustainability allows us to make sustainability decisions in the same way. Let's look at the best investments in sustainable tech that leave a positive, lasting impact on the people involved.

Stay ahead

Get the latest digest on business and technology trends straight to your inbox.